Resubmissions
10-10-2024 13:28
241010-qqpb5sxfle 1010-10-2024 13:25
241010-qnxwhaxemd 1010-10-2024 13:19
241010-qkwt2asfrm 1010-10-2024 13:14
241010-qg5mrsxcmh 10Analysis
-
max time kernel
264s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 13:19
Static task
static1
General
-
Target
malw.exe
-
Size
751KB
-
MD5
cd4ee0d6ce4f0fcc5105b1601946d94c
-
SHA1
a1b22767415d6230e9f2442f75b64a948759b8f2
-
SHA256
000948ea48835dd2fe087ca6b042eabbf280ac93fe2eb94558995a3a9db0b8a9
-
SHA512
2565e81816c7896db100e5ade16f456c76ee9b711d672711845b89d578a767077836510185fd605db3eefcdf1a1ced3a56e409bfae42f4f3f954d4f1ebaee5b5
-
SSDEEP
12288:v39mEqOVzmIJnfTu6EKrVwTBbHsot5ZeVK7EWWlPYnlMWn:vIEqE6sTxBwBtve0WRnW
Malware Config
Extracted
formbook
4.1
t18n
tmusicoregon.net
atici.online
j7u7.xyz
iewunucierwuerwnziqi1.info
ruvabetgiris.website
acik.lat
obsk.top
sphaltpaving-ttp1-shd-us-2.shop
ispensarynearme.news
b3nd.bond
urelook.xyz
gearlpfbm.top
aconstructionjob.bond
killsnexis.info
oshon.xyz
ashabsxw.top
ussiatraiding.buzz
raipsehumus.homes
6ae23rx.forum
edar88vvip.shop
47-nurse-92864.bond
p4g6.xyz
kymacaw.net
amedepot.shop
hekindclub.net
remiumpetsupplies.net
enisekran.xyz
pacerpa.shop
milelab.pro
mlibertypac.net
yflume.net
lecrtort.net
destramentoemcasa.shop
atubri.info
hop-gb.sbs
entalcar-onlineservices.lol
aylocnuocionkiem.website
oliticsclickour.xyz
eo-company-abc.online
efoplin.xyz
ndisec.net
ain-relief-728.xyz
essislotgoal14.xyz
1ngg4hdiwt5.shop
avada-ga-20.press
earing-tests-49842.bond
dnusaunni05.sbs
sim-for-travel.today
lotehupi.shop
bresz.xyz
ozyjtmt.christmas
awersip.xyz
unihbahis.net
ndustrialrichmond.best
isdom-sol.xyz
iden-paaaa.buzz
32xa544mg.autos
ental-health-89041.bond
uylevothyroxine.online
olar-installer-job-at-de2.today
usiness-phone-systems-6543.bond
77.info
enaydereli.xyz
pjn.xxx
xhibitonenotary.info
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/3672-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3672-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3672-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1468-73-0x0000000000550000-0x000000000057F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5072 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation malw.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 2024 set thread context of 3672 2024 malw.exe 89 PID 3672 set thread context of 3452 3672 malw.exe 56 PID 3672 set thread context of 3452 3672 malw.exe 56 PID 1468 set thread context of 3452 1468 mstsc.exe 56 PID 1468 set thread context of 5020 1468 mstsc.exe 100 PID 1468 set thread context of 4444 1468 mstsc.exe 103 PID 1468 set thread context of 2088 1468 mstsc.exe 104 PID 1468 set thread context of 3596 1468 mstsc.exe 105 PID 1468 set thread context of 4688 1468 mstsc.exe 106 PID 1468 set thread context of 3944 1468 mstsc.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133730401327215401" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 = 500031000000000047593350100041646d696e003c0009000400efbe4759ec494a597b6a2e0000004ee101000000010000000000000000000000000000005e562100410064006d0069006e00000014000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1\0\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\NodeSlot = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\ApplicationFrame Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:FMTID = "{30C8EEF4-A832-41E2-AB32-E3C3CA28FD29}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 = 56003100000000004759054f1000526f616d696e6700400009000400efbe4759ec494a597b6a2e0000005ae101000000010000000000000000000000000000003b500e0152006f0061006d0069006e006700000016000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\SplashScreen Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\IconSize = "48" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1\0 = 4e003100000000004a59d86a100054656d7000003a0009000400efbe4759ec494a59d86a2e0000006de101000000010000000000000000000000000000004ef18200540065006d007000000014000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\ApplicationFrame\windows.immersivecontrolpanel_cw5n1h2txyewy!mi Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616193" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-940901362-3608833189-1915618603-1000\{63B0AFF8-8322-428B-AD8A-2060EDD05E72} chrome.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\ApplicationFrame\windows.immersivecontrolpanel_cw5n1h2txyewy!mi = f401000040010000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f80cb859f6720028040b29b5540cc05aab60000 Explorer.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3452 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 malw.exe 2024 malw.exe 3672 malw.exe 3672 malw.exe 3672 malw.exe 3672 malw.exe 5072 powershell.exe 5072 powershell.exe 3672 malw.exe 3672 malw.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 5020 chrome.exe 5020 chrome.exe 1468 mstsc.exe 1468 mstsc.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3452 Explorer.EXE -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 3672 malw.exe 3672 malw.exe 3672 malw.exe 3672 malw.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe 1468 mstsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2024 malw.exe Token: SeDebugPrivilege 3672 malw.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeDebugPrivilege 1468 mstsc.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeDebugPrivilege 3888 taskmgr.exe Token: SeSystemProfilePrivilege 3888 taskmgr.exe Token: SeCreateGlobalPrivilege 3888 taskmgr.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: 33 3888 taskmgr.exe Token: SeIncBasePriorityPrivilege 3888 taskmgr.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3452 Explorer.EXE 3452 Explorer.EXE 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3452 Explorer.EXE 3452 Explorer.EXE -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3888 taskmgr.exe 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE 3452 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3452 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 5072 2024 malw.exe 86 PID 2024 wrote to memory of 5072 2024 malw.exe 86 PID 2024 wrote to memory of 5072 2024 malw.exe 86 PID 2024 wrote to memory of 2120 2024 malw.exe 88 PID 2024 wrote to memory of 2120 2024 malw.exe 88 PID 2024 wrote to memory of 2120 2024 malw.exe 88 PID 2024 wrote to memory of 3672 2024 malw.exe 89 PID 2024 wrote to memory of 3672 2024 malw.exe 89 PID 2024 wrote to memory of 3672 2024 malw.exe 89 PID 2024 wrote to memory of 3672 2024 malw.exe 89 PID 2024 wrote to memory of 3672 2024 malw.exe 89 PID 2024 wrote to memory of 3672 2024 malw.exe 89 PID 3452 wrote to memory of 1468 3452 Explorer.EXE 90 PID 3452 wrote to memory of 1468 3452 Explorer.EXE 90 PID 3452 wrote to memory of 1468 3452 Explorer.EXE 90 PID 1468 wrote to memory of 2756 1468 mstsc.exe 91 PID 1468 wrote to memory of 2756 1468 mstsc.exe 91 PID 1468 wrote to memory of 2756 1468 mstsc.exe 91 PID 3452 wrote to memory of 5020 3452 Explorer.EXE 100 PID 3452 wrote to memory of 5020 3452 Explorer.EXE 100 PID 5020 wrote to memory of 4444 5020 chrome.exe 103 PID 5020 wrote to memory of 4444 5020 chrome.exe 103 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 2088 5020 chrome.exe 104 PID 5020 wrote to memory of 3596 5020 chrome.exe 105 PID 5020 wrote to memory of 3596 5020 chrome.exe 105 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106 PID 5020 wrote to memory of 4688 5020 chrome.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\malw.exe"C:\Users\Admin\AppData\Local\Temp\malw.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\malw.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\malw.exe"C:\Users\Admin\AppData\Local\Temp\malw.exe"3⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\malw.exe"C:\Users\Admin\AppData\Local\Temp\malw.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\malw.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffede36cc40,0x7ffede36cc4c,0x7ffede36cc583⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1916 /prefetch:23⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2020,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:33⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2416 /prefetch:83⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:13⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3740,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:13⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:83⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4948 /prefetch:83⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4744,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5060 /prefetch:83⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:83⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4852,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4832 /prefetch:13⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5264,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5284 /prefetch:13⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5464,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:13⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3208,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:83⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5456,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5272 /prefetch:83⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3176,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:13⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3280,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3572 /prefetch:13⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4660,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:83⤵
- Modifies registry class
PID:968
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3888
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5064
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\45ea903517594eaaa0e2c9b8b4e44c86 /t 744 /p 50201⤵PID:3884
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c 0x49c1⤵PID:2168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2560
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b2c312f0351e806fea8f1b5742c6c4c3
SHA1c7359aa686409af42cfcd44f8c17814c1892815e
SHA256e36a47865d825c35f2a65d21e12f28e79adfd0154a8874d2b0c97e5df4f4d3ab
SHA512febd0be108860b743938c3171c9b8b2b7fc4f6004b465cadfab2125988eb70a662e2e8ea00078ce94184acc01c4a2f11043d80c38ffd7ffa251d1377a043239e
-
Filesize
5KB
MD513f5f10aa9f9c02dabfe776a0f61cb4f
SHA11e6f521bfb2698905bf8cf09877a6b15ac4d4ffe
SHA2567f8f6245ee7aa58347d71faa6ec5af554ec638ca2c74641b617f24cc6bab84fa
SHA512dc89b53bcc050036e0683a745dec1977fcd53d5e06ae2e974c475f339fac323fcb166a63f6064f00eadcdcdfd77009522917ac0746ad896dd52291ff25f7a49c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD526d2f61c2ac6aba9243835bb9b1f0b45
SHA1a19cfbfd9ddb2cbbd9635272a8d423e905676cd2
SHA256230a04bc53e50deb25963333ab7e0f8a7f465970608cfeb8aa46ca8583b3ed67
SHA512ee95d8f5675dee1bc628a406404c609b9110ff39510ac5f204314a53ca0dcecad976a5a8c5832d80eea3b5ce78329ab3618a23c29eef0c1145d48c73a97ac443
-
Filesize
1KB
MD528e870c8f1b985a5270d0ccbb1acbc46
SHA1d7e2a438dd36a42b4fb7791f38e8efbbcd3f2458
SHA256a5a36ad05c53fba7f3d3a00ad7d3479f70b3e2db5050208858788a0de940b371
SHA5128d669a2a6c14d3dc65b77725734d8232e2f6dceb7644780553a86975a8cdb385d28dc42c7db7f461fe5d7140b78002e87ec0bc7c769429f3b07c246780fb321b
-
Filesize
1KB
MD564463f2dd1c3d8cd848fb79d9ad33323
SHA12df0e27f05919ca5485975cf4ed485a1c38bbc2c
SHA256771307dfa1a62d90c91bc3bfe414da054a2862d7e7e57596ca96e0d2017ff47b
SHA512842bf6527948d2ae8523eabbfbafefbff777f126016f70335e1a8ffd866628e381bc915d53431633b917fd34c46003cc43e036e33f9fb1a8f03d0f4c7e559612
-
Filesize
356B
MD51350e7692e12f26b7d8d88df76f86db2
SHA12c28a2ff378ef1ce262a9c03952c8eaca12e77b2
SHA2563f0e8e4f49a6454ba82950a419642568d832196c6a768ac91a0cd3e47afc80ef
SHA512bf30e593e13d1f3307b2b0097220d5063d36f667ebdff198d44ad06d8776f96f3c08e97136d0fc5e856c5cf3e8712f5dacd9f643edda5adea25b3af06ba15cae
-
Filesize
8KB
MD51c2398feb257c2e4204d3def68db90e2
SHA1bd6075c41cdd14725bf8b24cc0c845b1bfc10af8
SHA2562f02151185d0a6a99bd2236eb916d16a351addb0c80ce79d43f25e525cd588d1
SHA512adc04b9cee843fd32a9a29d743bc4e367c17e4b9e66b2f934584a7615998c68b422635c22e976b3553053ca2159b6b50d5ac641c44e8dce1513da41179405b66
-
Filesize
10KB
MD51740aa883acb2fdd6aaa2203592a0ec8
SHA157c48d1e476eb139b7b1e84b2d0eabc3ad3eb687
SHA2561ac49dde6a426687467a4883e5bbbcea4d1164ebb4db3003717479720aa53a2a
SHA512223883f50206cd02ae27ac28eeff5acee6ecc2c7fb1c182cb17a9957945ceef1f4ad20a80384cf4dbee7bc80a883099ea2a254c3d1ee9f072a0cfe976108c29c
-
Filesize
10KB
MD559ae405ee9a51a61059a252dc3099381
SHA1b786c3d79f769f10751abefa2b1b921ce434baec
SHA2564a9b236e5911b027018ab15df626d73bca953b35854287586fea94abc53a527b
SHA512d303cfa6be3f424d100ab2044d63301b638419cc133349e7a34645f3a3090d1dda5ee326c18381bf33e6bd5114fabf720f819181272a6bae96258da81f2ff33a
-
Filesize
9KB
MD510670ba02971abd67499553901d1a476
SHA1322afc6fff6b93fdb1da818379bbefc10010fdb4
SHA256a83680472eabfff5b62dfc5d4f3fb52e31bf45658353e69f1956853ad80a2f6e
SHA51203da93fb7923c643046d9e07de480a9b82cd05f49ecec2d5282757e37c76710cd35e678d030b7cb76adfb795db7e501f19865f8d0d7aae0d3999eef3c7353f07
-
Filesize
15KB
MD51e28101367c0aab90d62c048e8d4fad3
SHA115abb40a98cd5230904ea819032010b8b58ca942
SHA256c3005bf26cd32c502295116989a97ff7b00c5bac760a6a9639605edc5342c98b
SHA5120ab244ae8b79e0de64d4e9cf46e15b801299797754f8915d4b3362beca62239b1e3e868469256ac5256b4c0d28c008e359ad44e611e418b4ccfa09c80078dfb4
-
Filesize
228KB
MD50e81f245c519fe9d9b5b878297dc3675
SHA16deaa459677e2d1bcc5be396c80f7173e805a14d
SHA25643463172b733d602cd89b2d2eb9b5bd72813e9bd46e787da0266c538fe0369c9
SHA512862549e666c2d5fa102afa2523351cb6160a86e5261e7b56a390e51f05dc8a6a8c43eafcd14746b1b049d445709cae9ca8778e46494edf908073c372d09e2e54
-
Filesize
228KB
MD57648ba201e36da1daffcf26eb705e6ba
SHA1d118969f75578dcebc890f23755b0878fb55cb2a
SHA256c7af7d5020c1950db22c907883dca7e00bf03430da1749c34d8b469ef028d671
SHA51235dc254327beb34305311dda9ad9a5231d6afe57110d6ab140fa25e15e977c28b88d0438924b8a2ceba74024fa52da752cc7fde64f3eba79bd937ccfd1538fea
-
Filesize
228KB
MD55890dd40fd2048b04a41d557ddcffb94
SHA10d24a87bac29e68c0b07e869c7ba4cf77854a4c5
SHA256605098cc992502cc6eabff7bf4093d4e3e34c98ff087dc132e74e721a00f730c
SHA512914aa84f7bda64a4c0e259579b66e7f9c3d332ecb0465b6c3f37595d18f355894dd57e0a14612bba3020c0b6e15e0904413649a593c198f6cb7213f2e60757be
-
Filesize
264KB
MD5714dc648ddfe4f923d81eeca035d2f2e
SHA1d95cc7a4ae23889a567a7d8c7b28ee9c12e895e2
SHA256990ff8d7525f7d090bf64cc6f56834d8fc62f7d51ba41f1fb1e5bf3b6e2e1763
SHA512163d28fd03acdd2e978d556012590d4ed0b93114d9eed407674a8c62dbd9acb41f62819fc6ea26218cb4b33e85b9628baea6170dbecffaa54473a031a984ffa0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84